Image watermarking based on integer wavelet transform-singular value decomposition and variance pixels

With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership from multimedia distribution. This paper proposes an image watermarking scheme based on integer wavelet transform and singular value decomposition. Embedding watermark locations are de...

Full description

Saved in:
Bibliographic Details
Main Authors: Ferda, Ernawan, Dhani, Ariatmanto
Format: Conference or Workshop Item
Language:English
English
Published: 2018
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/22360/1/37.%20Image%20watermarking%20based%20on%20integer%20wavelet%20transform-singular%20value.pdf
http://umpir.ump.edu.my/id/eprint/22360/2/37.1%20Image%20watermarking%20based%20on%20integer%20wavelet%20transform-singular%20value.pdf
http://umpir.ump.edu.my/id/eprint/22360/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership from multimedia distribution. This paper proposes an image watermarking scheme based on integer wavelet transform and singular value decomposition. Embedding watermark locations are determined by using variance pixels. Selected blocks with the lowest variance values are transformed by Integer Wavelet Transform (IWT) and the LL sub-band of 8×8 transform domain is computed using singular value decomposition. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules with considering watermark bits and an optimal threshold. This research reveals the optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. The binary watermark is scrambled by Arnold transform before embedding watermark. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental result indicates that our scheme achieves higher robustness than other scheme under different types of attack.